US7249375B2 - Method and apparatus for end-to-end identity propagation - Google Patents
Method and apparatus for end-to-end identity propagation Download PDFInfo
- Publication number
- US7249375B2 US7249375B2 US10/682,947 US68294703A US7249375B2 US 7249375 B2 US7249375 B2 US 7249375B2 US 68294703 A US68294703 A US 68294703A US 7249375 B2 US7249375 B2 US 7249375B2
- Authority
- US
- United States
- Prior art keywords
- token
- user
- application
- tier
- backend
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Definitions
- the present invention relates to techniques for providing authentication within computer systems. More specifically, the present invention relates to a method and an apparatus that provides end-to-end identity propagation to support access to computer applications.
- Some systems provide a single sign-on (SSO) service that can be used as a single point of authentication for partner applications, and can thereby facilitate end-to-end authentication for the partner applications.
- SSO single sign-on
- partner applications can receive user authentication through a token issued by the SSO server.
- These partner applications can, in turn, access other partner applications using the SSO token, thereby maintaining the end-to-end authentication, and providing a centralized trust model.
- RDBMS relational database management system
- Some applications that are not SSO-enabled can provide authentication based on user identities in a number of ways. Users may be defined locally to an RDBMS instance. Users may be authenticated by an external repository, such as a Kerberos system, a remote authentication dial-in user service (RADIUS), or a lightweight directory access protocol (LDAP) service. Additionally, enterprise users may be authenticated using the public key infrastructure (PKI) or may be password authenticated. While these methods each have advantages, they do not provide a centralized trust model and consequently have security problems.
- PKI public key infrastructure
- One embodiment of the present invention provides a system that facilitates end-to-end identity propagation to a backend-tier application that is not single sign-on enabled.
- the system receives a request from a user at a middle-tier application to access private data from the backend-tier application.
- the system redirects the user to a single sign-on server that verifies authentication credentials of the user.
- the middle-tier application receives a token from the single sign-on server authorizing access to a backend-tier application.
- the middle-tier application uses the token to access the private data from the backend-tier application, and then provides the private data to the user.
- the token includes the authentication credential of the user, and is recognized as valid by a backend-tier application.
- the backend-tier application can use the token to access applications in an additional tier of applications.
- the token includes a security certificate, and is recognized as valid by a single sign-on enabled database application.
- the single sign-on enabled database application can use the token to access applications in an additional tier of applications.
- the token includes a user-name and a password that can be used by the middle-tier application to access a third-party service.
- the token is a standards based extensible markup language (XML) formatted token recognized by third party services which comply with web standards.
- XML standards based extensible markup language
- the third-party service includes a web-based application.
- FIG. 1 illustrates computer systems coupled together in accordance with an embodiment of the present invention.
- FIG. 2 presents a flowchart illustrating the process of accessing a database application in accordance with an embodiment of the present invention.
- FIG. 3 presents a flowchart illustrating how an application service accesses a database as a proxy for a user in accordance with an embodiment of the present invention.
- FIG. 4 presents a flowchart illustrating the process of accessing an external application in accordance with an embodiment of the present invention.
- a computer readable storage medium which may be any device or medium that can store code and/or data for use by a computer system.
- the transmission medium may include a communications network, such as the Internet.
- FIG. 1 illustrates computer systems coupled together in accordance with an embodiment of the present invention.
- the system includes single sign-on (SSO) enabled service application 104 , SSO server 106 , SSO partner application 108 , relational database management system (RDBMS) application 110 , and third-party application 112 .
- SSO-enabled service application 104 receives requests from user 102 to access backend-tier applications, such as SSO partner application 108 , RDBMS application 110 and third-party application 112 .
- backend-tier applications such as SSO partner application 108 , RDBMS application 110 and third-party application 112 .
- SSO-enabled service application 104 Upon receiving a request to access a backend-tier application, SSO-enabled service application 104 redirects the request to SSO server 106 .
- SSO server 106 authenticates user 102 and returns an access token (not shown). SSO-enabled service application 104 then uses this token to access the backend-tier application.
- SSO-enabled service application 104 forwards the access token to SSO partner application 108 .
- SSO partner application 108 accepts the access token and provides the requested information to user 102 via SSO-enabled service application 104 . Additionally, SSO partner application 108 can use the access token to access additional tiers of applications on behalf of user 102 . Details of accessing RDBMS application 110 and third-party application 112 are discussed below in conjunction with FIGS. 2-4 .
- SSO server 106 can issue tokens in multiple formats based upon the capabilities of the target system. Hence, SSO server 106 is able to do end-to-end identity propagation in a heterogeneous environment. Note that SSO server 106 can determine the type of target system-whether the target system is SSO partner application 108 , RDBMS application 110 , or third-party application 112 and in the case of third-party application 112 whether a user/password or standards based token is required. Based upon the target type, the appropriate token is issued.
- FIG. 2 presents a flowchart illustrating the process of accessing a relational database management system (RDBMS) application in accordance with an embodiment of the present invention. Note that the same process can be used for other backend applications as well.
- the system starts when a middle-tier application service receives a request from a user to access the RDBMS application (step 202 ).
- the application service redirects the user to the single sign-on (SSO) server (step 204 ).
- SSO single sign-on
- the SSO server then authenticates the user by requesting, receiving, and verifying user credentials received from the user (step 206 )
- the SSO server After authenticating the user, the SSO server provides an authentication token, which includes authentication data and access data for the user (step 208 ).
- this authentication data can include a Kerberos ticket, a PKI certificate, a standards based extensible markup language (XML) token, and/or a user name/password for the user.
- the application service then connects to the RDBMS using the authentication token (step 210 ). Finally, the RDBMS verifies the token and grants access to the user (step 212 ).
- FIG. 3 presents a flowchart illustrating how an application service accesses a database as a proxy for a user in accordance with an embodiment of the present invention.
- the system starts when a middle-tier application service receives a request from a user to access the RDBMS application (step 302 ).
- the application service requests an SSO token for its own identity from the SSO server (step 304 ).
- the application service connects to the RDBMS using its own identity and the SSO token (step 306 ).
- the RDBMS verifies the token and grants access to the application service (step 308 ).
- the application service then requests an SSO token from the SSO server for the user's identity (step 310 ).
- the application service presents this SSO token for the user's identity to the RDBMS and performs a proxy switch (step 312 ).
- the RDBMS verifies the user's identity from the SSO token (step 314 ).
- the RDBMS allows the application service to proxy for the user (step 316 ).
- FIG. 4 presents a flowchart illustrating the process of accessing an external application in accordance with an embodiment of the present invention.
- the system starts when an application service receives a request to access an external application such as a web-based application (step 402 ).
- the application service redirects the user to the SSO server for user authentication (step 404 ).
- the application service provides the authentication credential to access the external web application (step 406 ).
- This authentication credential can be in an XML token.
- the application service After receiving the authentication credential, the application service uses the authentication credential in the XML token to access the external web application (step 408 ). Finally, the application service provides the responses from the external web application to the user (step 410 ).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (16)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/682,947 US7249375B2 (en) | 2003-08-05 | 2003-10-09 | Method and apparatus for end-to-end identity propagation |
US11/789,746 US7913298B2 (en) | 2003-08-05 | 2007-04-24 | Method and apparatus for end-to-end identity propagation |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US49284003P | 2003-08-05 | 2003-08-05 | |
US10/682,947 US7249375B2 (en) | 2003-08-05 | 2003-10-09 | Method and apparatus for end-to-end identity propagation |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/789,746 Continuation US7913298B2 (en) | 2003-08-05 | 2007-04-24 | Method and apparatus for end-to-end identity propagation |
Publications (2)
Publication Number | Publication Date |
---|---|
US20050039008A1 US20050039008A1 (en) | 2005-02-17 |
US7249375B2 true US7249375B2 (en) | 2007-07-24 |
Family
ID=34138724
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/682,947 Active 2025-10-18 US7249375B2 (en) | 2003-08-05 | 2003-10-09 | Method and apparatus for end-to-end identity propagation |
US11/789,746 Active 2026-07-06 US7913298B2 (en) | 2003-08-05 | 2007-04-24 | Method and apparatus for end-to-end identity propagation |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/789,746 Active 2026-07-06 US7913298B2 (en) | 2003-08-05 | 2007-04-24 | Method and apparatus for end-to-end identity propagation |
Country Status (1)
Country | Link |
---|---|
US (2) | US7249375B2 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050204174A1 (en) * | 2004-03-11 | 2005-09-15 | International Business Machines Corporation | Password protection mechanism |
US20060041933A1 (en) * | 2004-08-23 | 2006-02-23 | International Business Machines Corporation | Single sign-on (SSO) for non-SSO-compliant applications |
US20070209066A1 (en) * | 2006-03-03 | 2007-09-06 | Neogent, Inc. | Method and system for identity management integration |
US20080263629A1 (en) * | 2006-10-20 | 2008-10-23 | Bradley Paul Anderson | Methods and systems for completing, by a single-sign on component, an authentication process in a federated environment to a resource not supporting federation |
US20080307517A1 (en) * | 2005-11-24 | 2008-12-11 | Nikolai Grigoriev | Method for Securely Associating Data with Http and Https Sessions |
US7792860B2 (en) | 2005-03-25 | 2010-09-07 | Oracle International Corporation | System for change notification and persistent caching of dynamically computed membership of rules-based lists in LDAP |
US7823192B1 (en) * | 2004-04-01 | 2010-10-26 | Sprint Communications Company L.P. | Application-to-application security in enterprise security services |
CN103501344A (en) * | 2013-10-10 | 2014-01-08 | 从兴技术有限公司 | Method and system for realizing single sign-on of plurality of applications |
US8843741B2 (en) | 2012-10-26 | 2014-09-23 | Cloudpath Networks, Inc. | System and method for providing a certificate for network access |
US9003507B2 (en) | 2012-03-23 | 2015-04-07 | Cloudpath Networks, Inc. | System and method for providing a certificate to a third party request |
US9187171B2 (en) | 2010-07-06 | 2015-11-17 | Ultra Electronics Limited | Linkage for guiding a flexible cable |
US9477517B2 (en) * | 2011-10-28 | 2016-10-25 | Qualcomm Incorporated | Service broker systems, methods, and apparatus |
US9825938B2 (en) | 2015-10-13 | 2017-11-21 | Cloudpath Networks, Inc. | System and method for managing certificate based secure network access with a certificate having a buffer period prior to expiration |
US10601809B2 (en) | 2015-01-20 | 2020-03-24 | Arris Enterprises Llc | System and method for providing a certificate by way of a browser extension |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030084171A1 (en) * | 2001-10-29 | 2003-05-01 | Sun Microsystems, Inc., A Delaware Corporation | User access control to distributed resources on a data communications network |
US20030084172A1 (en) * | 2001-10-29 | 2003-05-01 | Sun Microsystem, Inc., A Delaware Corporation | Identification and privacy in the World Wide Web |
US7275260B2 (en) | 2001-10-29 | 2007-09-25 | Sun Microsystems, Inc. | Enhanced privacy protection in identification in a data communications network |
US7404204B2 (en) * | 2004-02-06 | 2008-07-22 | Hewlett-Packard Development Company, L.P. | System and method for authentication via a single sign-on server |
US7574511B2 (en) | 2004-03-12 | 2009-08-11 | Merrill Lynch & Company, Inc. | Methods, systems, and software for providing service integration framework |
US7752322B2 (en) * | 2004-03-19 | 2010-07-06 | Sony Corporation | System for ubiquitous network presence and access without cookies |
US7702794B1 (en) * | 2004-11-16 | 2010-04-20 | Charles Schwab & Co. | System and method for providing silent sign on across distributed applications |
EP1705598A3 (en) * | 2005-03-20 | 2007-03-07 | ActivIdentity (Australia) Pty Ltd. | Method and system for providing user access to a secure application |
US7853995B2 (en) * | 2005-11-18 | 2010-12-14 | Microsoft Corporation | Short-lived certificate authority service |
US7912762B2 (en) | 2006-03-31 | 2011-03-22 | Amazon Technologies, Inc. | Customizable sign-on service |
US8499312B2 (en) * | 2007-03-09 | 2013-07-30 | Microsoft Corporation | Administrator level access to backend stores |
EP2040413B1 (en) * | 2007-09-21 | 2013-06-19 | Nokia Siemens Networks Oy | Subscription and advice of charge control |
US8250640B1 (en) * | 2007-09-28 | 2012-08-21 | Emc Corporation | Transparent kerboros delegation with a storage virtualization system |
US8387130B2 (en) * | 2007-12-10 | 2013-02-26 | Emc Corporation | Authenticated service virtualization |
US8438622B2 (en) * | 2008-07-10 | 2013-05-07 | Honesty Online, Llc | Methods and apparatus for authorizing access to data |
US8171057B2 (en) | 2008-10-23 | 2012-05-01 | Microsoft Corporation | Modeling party identities in computer storage systems |
US8632003B2 (en) | 2009-01-27 | 2014-01-21 | Novell, Inc. | Multiple persona information cards |
US20100251353A1 (en) * | 2009-03-25 | 2010-09-30 | Novell, Inc. | User-authorized information card delegation |
US8443430B2 (en) * | 2010-03-19 | 2013-05-14 | Oracle International Corporation | Remote registration for enterprise applications |
US8474017B2 (en) * | 2010-07-23 | 2013-06-25 | Verizon Patent And Licensing Inc. | Identity management and single sign-on in a heterogeneous composite service scenario |
US8583666B2 (en) | 2010-12-08 | 2013-11-12 | International Business Machines Corporation | Identity propagation through application layers using contextual mapping and planted values |
US20130086669A1 (en) | 2011-09-29 | 2013-04-04 | Oracle International Corporation | Mobile application, single sign-on management |
CN103379093B (en) * | 2012-04-13 | 2017-07-28 | 腾讯科技(北京)有限公司 | A kind of method and device for realizing account intercommunication |
US20130298215A1 (en) * | 2012-05-04 | 2013-11-07 | Rawllin International Inc. | Single sign-on user registration for online or client account services |
JP5968077B2 (en) * | 2012-05-22 | 2016-08-10 | キヤノン株式会社 | Information processing apparatus, control method therefor, program, and image processing apparatus |
US20140245411A1 (en) * | 2013-02-22 | 2014-08-28 | Nokia Corporation | Method and apparatus for providing account-less access via an account connector platform |
NL1040084C2 (en) * | 2013-03-08 | 2014-09-10 | Authasas B V | Emulation of federative authentication. |
CN103220303B (en) * | 2013-05-06 | 2016-08-31 | 华为软件技术有限公司 | The login method of server and server, authenticating device |
US9763039B2 (en) * | 2014-12-30 | 2017-09-12 | Alcatel-Lucent Usa Inc. | Controlling access to venue-related content, applications, and services |
US10057246B1 (en) * | 2015-08-31 | 2018-08-21 | EMC IP Holding Company LLC | Method and system for performing backup operations using access tokens via command line interface (CLI) |
US9923929B2 (en) * | 2015-11-20 | 2018-03-20 | Nasdaq, Inc. | Systems and methods for in-session refresh of entitlements associated with web applications |
US11516202B2 (en) * | 2019-12-26 | 2022-11-29 | Vmware, Inc. | Single sign on (SSO) capability for services accessed through messages |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6128738A (en) * | 1998-04-22 | 2000-10-03 | International Business Machines Corporation | Certificate based security in SNA data flows |
WO2001053971A1 (en) | 2000-01-24 | 2001-07-26 | Oracle Corporation | eDROPSHIP: METHODS AND SYSTEMS FOR ANONYMOUS eCOMMERCE SHIPMENT |
US7136857B2 (en) * | 2000-09-01 | 2006-11-14 | Op40, Inc. | Server system and method for distributing and scheduling modules to be executed on different tiers of a network |
-
2003
- 2003-10-09 US US10/682,947 patent/US7249375B2/en active Active
-
2007
- 2007-04-24 US US11/789,746 patent/US7913298B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6128738A (en) * | 1998-04-22 | 2000-10-03 | International Business Machines Corporation | Certificate based security in SNA data flows |
WO2001053971A1 (en) | 2000-01-24 | 2001-07-26 | Oracle Corporation | eDROPSHIP: METHODS AND SYSTEMS FOR ANONYMOUS eCOMMERCE SHIPMENT |
US7136857B2 (en) * | 2000-09-01 | 2006-11-14 | Op40, Inc. | Server system and method for distributing and scheduling modules to be executed on different tiers of a network |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050204174A1 (en) * | 2004-03-11 | 2005-09-15 | International Business Machines Corporation | Password protection mechanism |
US7823192B1 (en) * | 2004-04-01 | 2010-10-26 | Sprint Communications Company L.P. | Application-to-application security in enterprise security services |
US20060041933A1 (en) * | 2004-08-23 | 2006-02-23 | International Business Machines Corporation | Single sign-on (SSO) for non-SSO-compliant applications |
US7698734B2 (en) * | 2004-08-23 | 2010-04-13 | International Business Machines Corporation | Single sign-on (SSO) for non-SSO-compliant applications |
US7792860B2 (en) | 2005-03-25 | 2010-09-07 | Oracle International Corporation | System for change notification and persistent caching of dynamically computed membership of rules-based lists in LDAP |
US9088416B2 (en) * | 2005-11-24 | 2015-07-21 | Synchronica Plc | Method for securely associating data with HTTP and HTTPS sessions |
US20080307517A1 (en) * | 2005-11-24 | 2008-12-11 | Nikolai Grigoriev | Method for Securely Associating Data with Http and Https Sessions |
US20070209066A1 (en) * | 2006-03-03 | 2007-09-06 | Neogent, Inc. | Method and system for identity management integration |
US7793343B2 (en) * | 2006-03-03 | 2010-09-07 | Oracle America, Inc. | Method and system for identity management integration |
US20080263629A1 (en) * | 2006-10-20 | 2008-10-23 | Bradley Paul Anderson | Methods and systems for completing, by a single-sign on component, an authentication process in a federated environment to a resource not supporting federation |
US8281378B2 (en) * | 2006-10-20 | 2012-10-02 | Citrix Systems, Inc. | Methods and systems for completing, by a single-sign on component, an authentication process in a federated environment to a resource not supporting federation |
US8813203B2 (en) | 2006-10-20 | 2014-08-19 | Citrix Systems, Inc. | Methods and systems for completing, by a single-sign on component, an authentication process in a federated environment to a resource not supporting federation |
US9187171B2 (en) | 2010-07-06 | 2015-11-17 | Ultra Electronics Limited | Linkage for guiding a flexible cable |
US9477517B2 (en) * | 2011-10-28 | 2016-10-25 | Qualcomm Incorporated | Service broker systems, methods, and apparatus |
US9003507B2 (en) | 2012-03-23 | 2015-04-07 | Cloudpath Networks, Inc. | System and method for providing a certificate to a third party request |
US9032499B2 (en) | 2012-03-23 | 2015-05-12 | Cloudpath Neworks, Inc. | System and method for providing a certificate to a user request |
US9137234B2 (en) | 2012-03-23 | 2015-09-15 | Cloudpath Networks, Inc. | System and method for providing a certificate based on granted permissions |
US9137235B2 (en) | 2012-03-23 | 2015-09-15 | Cloudpath Networks, Inc. | System and method for providing a certificate based on list membeship |
US9825936B2 (en) | 2012-03-23 | 2017-11-21 | Cloudpath Networks, Inc. | System and method for providing a certificate for network access |
US8843741B2 (en) | 2012-10-26 | 2014-09-23 | Cloudpath Networks, Inc. | System and method for providing a certificate for network access |
CN103501344A (en) * | 2013-10-10 | 2014-01-08 | 从兴技术有限公司 | Method and system for realizing single sign-on of plurality of applications |
CN103501344B (en) * | 2013-10-10 | 2017-08-01 | 瑞典爱立信有限公司 | The method and system of single-sign-on are realized in many applications |
US10601809B2 (en) | 2015-01-20 | 2020-03-24 | Arris Enterprises Llc | System and method for providing a certificate by way of a browser extension |
US9825938B2 (en) | 2015-10-13 | 2017-11-21 | Cloudpath Networks, Inc. | System and method for managing certificate based secure network access with a certificate having a buffer period prior to expiration |
Also Published As
Publication number | Publication date |
---|---|
US20050039008A1 (en) | 2005-02-17 |
US7913298B2 (en) | 2011-03-22 |
US20070199056A1 (en) | 2007-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7249375B2 (en) | Method and apparatus for end-to-end identity propagation | |
US7111323B1 (en) | Method and apparatus to facilitate a global timeout in a distributed computing environment | |
US8966584B2 (en) | Dynamic authentication gateway | |
CN101331731B (en) | Method, apparatus and program products for custom authentication of a principal in a federation by an identity provider | |
US8799639B2 (en) | Method and apparatus for converting authentication-tokens to facilitate interactions between applications | |
JP5205380B2 (en) | Method and apparatus for providing trusted single sign-on access to applications and Internet-based services | |
US7134138B2 (en) | Methods and apparatus for providing security for a data storage system | |
US6401211B1 (en) | System and method of user logon in combination with user authentication for network access | |
US9686262B2 (en) | Authentication based on previous authentications | |
US8621598B2 (en) | Method and apparatus for securely invoking a rest API | |
US7174383B1 (en) | Method and apparatus to facilitate single sign-on services in a hosting environment | |
US20080072303A1 (en) | Method and system for one time password based authentication and integrated remote access | |
US8959570B2 (en) | Verifying a security token | |
US7340525B1 (en) | Method and apparatus for single sign-on in a wireless environment | |
US20090094383A1 (en) | User Enrollment in an E-Community | |
US20150039896A1 (en) | System and method for pool-based identity generation and use for service access | |
WO2016123416A1 (en) | Single sign-on for remote applications | |
US7540020B1 (en) | Method and apparatus for facilitating single sign-on to applications | |
KR20120089484A (en) | System and method for accessing private digital content | |
CN112352411B (en) | Registration of the same domain with different cloud service networks | |
US8326996B2 (en) | Method and apparatus for establishing multiple sessions between a database and a middle-tier client | |
US7530094B2 (en) | Method and apparatus for facilitating single sign-on of an application cluster | |
TWI831577B (en) | System for centralizing relying parties and registration authorities to provide certification service and method thereof | |
US11893102B1 (en) | Intelligent authentication gateway | |
EP3766221B1 (en) | Relying party certificate validation when client uses relying party's ip address |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ORACLE INTERNATIONAL CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BHATIA, GAURAV;SWAMINATHAN, ARUN;REEL/FRAME:014598/0810 Effective date: 20031006 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |